Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.11889/4112
DC FieldValueLanguage
dc.contributor.authorAl-Sa’deh, Ahmad
dc.contributor.authorRafiee, Hosnieh
dc.contributor.authorMeinel, Christoph
dc.date.accessioned2017-01-16T06:07:36Z
dc.date.available2017-01-16T06:07:36Z
dc.date.issued2013
dc.identifier.urihttp://hdl.handle.net/20.500.11889/4112
dc.description.abstractSEcure Neighbor Discovery (SEND) was proposed to counteract threats to the Neighbor Discovery Protocol (NDP). It is a strong security extension that can make the IPv6 local link very safe. SEND relies on dynamically Cryptographically Generated Addresses (CGAs) and X.509 certificates. However, SEND is not easily deployed and is still vulnerable to some types of attacks. This chapter evaluates the practical considerations of a SEND deployment taking a cryptographic approach as a means of securing the IPv6 local link operations. It reviews the remaining vulnerabilities and gives some recommendations with which to facilitate SEND deployment.en_US
dc.language.isoenen_US
dc.subject.lcshComputer security
dc.subject.lcshCryptography
dc.subject.lcshIPSec (Computer network protocol)
dc.titleSEcure Neighbor Discovery : a cryptographic solution for securing IPv6 local link operationsen_US
dc.typeArticleen_US
newfileds.departmentEngineering and Technologyen_US
newfileds.item-access-typeopen_accessen_US
newfileds.thesis-prognoneen_US
newfileds.general-subjectnoneen_US
item.grantfulltextopen-
item.languageiso639-1other-
item.fulltextWith Fulltext-
Appears in Collections:Fulltext Publications
Files in This Item:
File Description SizeFormat
2013_Alsadeh_SEND_IGI.pdf155.6 kBAdobe PDFView/Open
Show simple item record

Page view(s)

3
Last Week
0
Last month
2
checked on Dec 6, 2019

Download(s)

1
checked on Dec 6, 2019

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.